dia_one

Cypherix®’s comprehensive corporate network security solution provides for a network wide encryption based security implementation, using the existing hardware and software infrastructure of the enterprise.

It addresses vital security issues such as information security, access control, and hierarchical dissemination of information, without any issues of data migration into the new structure.

Stops Installation Maintenance
Internet Level Security Hackers Weeks 24/7
Network Level Security Hackers, Competition Months 24/7
Desktop Level Security Competition, Insiders Hours None

Costs involved in securing data

CRYPTAINER SE

Cryptainer SE has all the functionality of Cryptainer, plus an additional password recovery feature. With well over 7 million users, it proves to be appropriate for all network security needs. The end-user interface is identical to that of Cryptainer, the award winning, easy-to-use encryption software. Cryptainer SE ensures your privacy by keeping your data private and secure on your PC as well as removable storage. Specially tailored to meet the growing security and privacy needs of the corporate user, Cryptainer SE combines the ease of use and simple drag-and-drop operations with strong encryption, to ensure total security, with a zero learning curve and maximum convenience.

The solution does not require any input from the enterprise in terms of user migration for a secure solution, since it is presumed that all users are already familiar with basic Windows functionality like drag-and-drop. Components within the implementation use the cryptographically secure Blowfish strong encryption scheme operating at a bit strength of 448 bits.

Encrypting data at the user level is the easiest and most foolproof method of data security. Encryption functions at the most basic level, that of the data itself. This makes it an appropriate and necessary tool in network security. CryptainerSE within a network environment serves as a solution to most issues besetting network administrators. The total cost of ownership (TCO) is a fraction of other products (like - firewalls, Intrusion Detection Systems, etc.). Additionally CryptainerSE solves additional issues that other products don't.

Read More

SECURITY

All modules are based on a secure implementation of the blowfish strong encryption algorithm at key strength of 448 bit. The CryptainerSE based solution has the following primary security features:

  • Strong encryption. Estimated time for decryption using a brute force attack is more than the age of the universe.
  • Maintains legitimacy and integrity of data.
  • Built in protection of all executables and binaries against modification and/or corruption.
  • Comprehensive access control. Only authorized users can access data.

SIMPLICITY

It is our belief that it is crucial to the adaptation of any security scheme that there be no deviation in the end user's patterns of normal computing. With this in mind, End user components in the scheme have been specially designed to ensure maximum utility and simplicity of use.

  • No end user training required.
  • Data encryption with equal efficiency regardless of file type.
  • Single password as point of access to all files within a virtual drive.
  • Encrypted containers appear as standard hard disk partitions to the OS and all applications.

Cryptainer offers true on-the-fly disk encryption to ensure that absolutely anyone can use it effectively. No more password protecting files one at a time. No more deleting documents manually after encrypting them.

Cryptainer SE protects your data by creating multiple encrypted vaults for all your files and folders. Encrypted containers appear as standard hard disk partition to the OS and all applications. Using Cryptainer you can encrypt any type of data/file format, whether it is textual, tabular, graphical, organized in a database, audio or video. Just drag, drop and unload to encrypt. What you get is foolproof, hassle-free, unbreakable security.

Read More

SYSTEM COMPATIBILITY

Cryptainer SE works with all 32 bit as well as 64 bit versions of Microsoft Windows (Windows XP, Windows Vista, Windows 7, Windows 8.1, Windows 10). It encrypts on all file systems such as FAT, FAT12, FAT32, NTFS or NTFS with EFS.

COMMAND LINE PROCESSING

Powerful command line processing available for encrypting/decrypting at the dos prompt. Group a series of encryption and decryption commands in a single or multiple batch files.

CRYPTAINER ADMINISTRATIVE MODULE

Corporate users can maintain control, despite individual end users’ freedom to set independent passwords, without administrative intervention. In case an employee leaves or inadvertently encrypts vital data, it is possible for the corporation to recover such data, if they so deem necessary.

The Cryptainer Administrative Module provides corporate users with single point control and monitoring of the distributed security system without introducing any of the weaknesses inherent in the underlying operating systems. This ensures the integrity of your data, and at the same time gives you flexibility and overall control. You have the freedom to implement your company security policies without changing any underlying software.